{"id":1,"name":"simonjga","url":"https:\/\/cybersecuritymadesimple.com","description":"","link":"https:\/\/cybersecuritymadesimple.com\/index.php\/author\/simonjga\/","slug":"simonjga","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/13efeffd042f95777e642ecd119f8aaebc232a735eabfad8d75287512aad7f95?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/13efeffd042f95777e642ecd119f8aaebc232a735eabfad8d75287512aad7f95?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/13efeffd042f95777e642ecd119f8aaebc232a735eabfad8d75287512aad7f95?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/cybersecuritymadesimple.com\/index.php\/wp-json\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecuritymadesimple.com\/index.php\/wp-json\/wp\/v2\/users"}]}}